Security is a top priority for our team. Our planning, development and deployment processes are based on years of best practices.
Over a hundred years of combined Security experience running mission critical workloads in the cloud make up the fabric of our Security teams. We use behavioral analysis, static rules, and custom filters looking for zero-day exploits.
We use Static Rules (User definitions such as IP address, HTTP header content, country, and session ID) and Dynamic Filtering (Behavioral and reputational filtering of threat data automatically and in real-time) in our security stack.
We also believe in strong Layer 7 Protection (Top layer firewall for threat detection, mitigation and syndication) with our partners Cloudflare.